Encryption Image using HiSea Algorithm Based on Android Operating System
DOI:
https://doi.org/10.32628/IJSRSET218147Keywords:
encryption image, hybrid cubes encryption algorithm, security of mobile, Android OS, and decryption image.Abstract
The mobile phone environment represents one of the important environments in encryption various multimedia (audio, image, and video) , and this depends on the type of algorithm used in the encryption process, as phones have limited memory and computational resources, Therefore the selection of the algorithm must be compatible with the mobile environment in terms of speed, safety and flexibility in addition to choosing an algorithm that The simplicity and safety of the image encryption process was investigated with lightweight and efficient computing. In this paper, Hybrid Cube Encryption (HiSec) was used. When implementing this algorithm in a smart phone environment, the results showed the ease of encrypting images and retrieving the original image, in addition to that it only requires small computational resources, and the algorithm was very effective in encrypting images on mobile phones. This suggested method has been implemented in the mobile environment with android OS. The proposed method has been programmed in JAVA, and the method has been tried on different types of mobile phones (such as Huawei Nova 2, Huawei Nova 7, HTC, NOT 8, Galaxy S 20, and HONOR).
References
- Mahmud H, A., Angga W, B., Tommy, Marwan E, A., & Siregar, R. (2018),” Performance analysis of AES-Blowfish hybrid algorithm for security of patient medical record data”, Journal of Physics: Conference Series, 1007, 01 2018. doi:10.1088/1742-6596/1007/1/012018
- Rani R, Sharma G, 2017, “Review Paper on Data Hiding In 3D Barcode Image Using Steganography”, International Journal of Advanced Research in Computer Science, Volume 8, No. 5, May-June 2017, 2271—2276, ISSN No. 0976-5697, DOI: 10.26483/ijarcs.v8i5.4056
- Emy Setyaningsih* 1, Catur Iswahyudi2, Naniek Widyastuti3,” Image Encryption on Mobile Phone using Super Encryption Algorithm”, TELKOMNIKA, Vol.10, No.4, December 2012, pp. 837~845 ISSN: 1693-6930, DOI: 10.12928/telkomnika. v10i4.23
- Shankar, T. N., Sahoo, G., & Niranjan, S. (17 December 2010),”Image Encryption for mobile devices”, IEEE Xplore:. doi:10.1109/icccct.2010.5670766 .
- H. Zimeng, “Security of Mobile Devices and Wi-Fi Networks,”( 2015) , Bachelor’s Thesis MAMK Unviversity of applied sciences, https://www.theseus.fi/
- Aya Khalid Naji and Saad Najim Alsaad (August 2017) , “Data (Video) Encryption in Mobile Devices”, Kurdistan Journal for Applied Research kjar.spu.edu.iq,Volume 2, Issue 3, , P-ISSN: 2411-7684 – E-ISSN: 2411-7706, DOI: 10.24017/science.2017.3.17
- A.MohdShahdi, M.NurEmyra, N.Rathidevi, H.Rosilah and H.Nor Effendy, (2013) “ Comparison Between Android and iOS Operating System in terms of Security,” In Proceedings of the IEEE International Conference on Information Technology in Asia (CITA), DOI: 10.1109/CITA.2013.6637558
- A.Jeremy,H. Alexander V. and A.Naser,( 2014), “Cider: Native Execution of iOS Apps on Android, ” in Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS),pp.367-381, , https://doi.org/10.1145/2654822.2541972
- Vaibhav Kumar Sarkania,( 2013), “ Android Internals” International Journal of Advanced Research in Computer Science and Software Engineering, ISSN 2277 128X, Volume 3, Issue6, pp 143-147, https://www.coursehero.com/file/21330755/V3I6-0134/
- J. Thakur, Nagesh Kumar ,( 2011), "DES, AES, and Blowfish: Symmetric key cryptography," International Journal of Emerging Technology and Advanced Engineering, vol. 1, no. 2, pp. 6-12, https://www.academia.edu/3345271.
- Muhammad, Sapiee Jamel, Abdulkadir, Zahraddeen A. Pindar, Nur Shakir, Mustafa Mat Deris,( 2017), "A Survey on the Cryptographic Encryption Algorithms," (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 8, no. 11, p. 7978, https://thesai.org/Downloads/Volume8No11.
- Jamel, S., Deris, M. M., Yanto, I. T. R., & Herawan, T. (2011). The Hybrid Cubes Encryption Algorithm (HiSea). Communications in Computer and Information Science, 191–200,,Springer-Verlag , doi:10.1007/978-3-642-21153-9_18
- M. F. Mushtaq, S. Jamel, K. M. Mohamad, S. A. A. Khalid, and M. M. Deris,( 2017 ), “Key generation technique based on triangular coordinate extraction for hybrid cubes,” Journal of Telecommunication, Electronic and Computer Engineering (JTEC), vol. 9, no. 3-4, pp. 195-200, https://www.semanticscholar.org
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.